Beware of Vacation-Related Scams: 4 Most Prevalent Types
Email scam actors constantly try to pick a better disguise for their fraudulent messages. Summer, the time when people commonly plan to take a break from their jobs and travel,…
BlackCat Ransomware New Update Boosts Exfiltration Speed
BlackCat ransomware continues to make a fuss globally for the second year now, targeting various sectors. Most of the time, it goes to healthcare, government, education, manufacturing, and hospitality. The…
Hackers Can Use ChatGPT Hallucinations to Distribute Malicious Packages
According to vulnerability and risk management company Vulcan Cyber, attackers can manipulate ChatGPT to distribute malicious packages to software developers. Let me remind you that we also said that ChatGPT…
What is “Windows Key Code Is Not Valid And Seems Pirated”?
Windows Key Code Is Not Valid And Seems Pirated appears to be a new scary scam approach used to trick Windows users. Banners with this prompt may appear out of…
How to Defeat Insider Threat?
In the current digital world, organizations face more risks than ever due to fast-paced technological changes. However, while external cyber threats such as hackers and malware often dominate the headlines,…
Microsoft Researchers Link Clop Gang to MOVEit Transfer Attack
Microsoft has linked the Clop ransomware gang to a recent attack that uses a zero-day vulnerability in the MOVEit Transfer platform to steal data from organizations. The company's Threat Intel…
ChatGPT has become a New tool for Cybercriminals in Social Engineering
Artificial intelligence has become an advanced tool in today's digital world. It can facilitate many tasks, help solve complex multi-level equations and even write a novel. But like in any…
Conti Ransomware Heritage in 2023 – What is Left?
Ransomware groups come and go, but the people behind them continue to use their hacking and extortion skills in new operations. For example, former members of the now-defunct Russian-language ransomware…
The AI-Controlled Drone Did Not “Kill” Its Operator Even During the Simulation. At Least for Now
At the recent Future Combat Air and Space Capabilities summit, the head of AI testing and operations at the US Air Force said that during a simulation, an AI-controlled drone…
Russian Hacker Sells Terminator Tool That Is Allegedly Able to Bypass Any Antivirus Programs
A tool called Terminator appeared on one of the Russian hacker forums, and, according to its author, can destroy any anti-virus programs, as well as XDR and EDR platforms. Information…
What is Business Email Compromise (BEC) Attack?
Business email compromise attack, or shortly BEC, is a relatively new vector of cyberattacks. Dealing primary damage by exposing potentially sensitive information, also allows hackers to use the email for…
MOVEit MFT 0-day Vulnerability is Used to Steal Corporate Data
MOVEit managed file transfer (MFT) solution appears to contain a 0-day vulnerability, already exploited by hackers. Progress, the developer of the software solution, already released a note and security advisory…